nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A bibliometric analysis and visualization of blockchain
|
Guo, Yi-Ming |
|
|
116 |
C |
p. 316-332 |
artikel |
2 |
A comparison of mechanisms for compensating negative impacts of system integration
|
Lesch, Veronika |
|
|
116 |
C |
p. 117-131 |
artikel |
3 |
A container-based cloud-native architecture for the reproducible execution of multi-population optimization algorithms
|
García Valdez, Mario |
|
|
116 |
C |
p. 234-252 |
artikel |
4 |
ALBUS: A method for efficiently processing SpMV using SIMD and Load balancing
|
Bian, Haodong |
|
|
116 |
C |
p. 371-392 |
artikel |
5 |
A multi-stage denoising framework for ambulatory ECG signal based on domain knowledge and motion artifact detection
|
Xie, Xiaoyun |
|
|
116 |
C |
p. 103-116 |
artikel |
6 |
A novel method for identifying the damage assessment tweets during disaster
|
Madichetty, Sreenivasulu |
|
|
116 |
C |
p. 440-454 |
artikel |
7 |
A self structuring artificial intelligence framework for deep emotions modeling and analysis on the social web
|
Adikari, Achini |
|
|
116 |
C |
p. 302-315 |
artikel |
8 |
A theoretical method to evaluate honeynet potency
|
Ren, Jianguo |
|
|
116 |
C |
p. 76-85 |
artikel |
9 |
Blog text quality assessment using a 3D CNN-based statistical framework
|
Ji, Fang |
|
|
116 |
C |
p. 365-370 |
artikel |
10 |
CODE-V: Multi-hop computation offloading in Vehicular Fog Computing
|
Hussain, Md. Muzakkir |
|
|
116 |
C |
p. 86-102 |
artikel |
11 |
Denial of Chain: Evaluation and prediction of a novel cyberattack in Blockchain-supported systems
|
Bordel, Borja |
|
|
116 |
C |
p. 426-439 |
artikel |
12 |
Design of an innovative IT platform for analytics knowledge management
|
Rabhi, Fethi A. |
|
|
116 |
C |
p. 209-219 |
artikel |
13 |
Detecting anomalies in microservices with execution trace comparison
|
Meng, Lun |
|
|
116 |
C |
p. 291-301 |
artikel |
14 |
DISCERNER: Dynamic selection of resource manager in hyper-scale cloud-computing data centres
|
Fernández-Cerero, Damián |
|
|
116 |
C |
p. 190-199 |
artikel |
15 |
Easy and efficient agent-based simulations with the OpenABL language and compiler
|
Cosenza, Biagio |
|
|
116 |
C |
p. 61-75 |
artikel |
16 |
Editorial Board
|
|
|
|
116 |
C |
p. ii |
artikel |
17 |
Facilitating external sorting on SMR-based large-scale storage systems
|
Chen, Chih-Hsuan |
|
|
116 |
C |
p. 333-348 |
artikel |
18 |
FLAGS: A methodology for adaptive anomaly detection and root cause analysis on sensor data streams by fusing expert knowledge with machine learning
|
Steenwinckel, Bram |
|
|
116 |
C |
p. 30-48 |
artikel |
19 |
Future Generation Computer Systems: Publisher’s Note
|
Faez, Telli |
|
|
116 |
C |
p. iii |
artikel |
20 |
Generating knowledge graphs by employing Natural Language Processing and Machine Learning techniques within the scholarly domain
|
Dessì, Danilo |
|
|
116 |
C |
p. 253-264 |
artikel |
21 |
HealthXAI: Collaborative and explainable AI for supporting early diagnosis of cognitive decline
|
Khodabandehloo, Elham |
|
|
116 |
C |
p. 168-189 |
artikel |
22 |
Human action identification by a quality-guided fusion of multi-model feature
|
Bi, Zhuo |
|
|
116 |
C |
p. 13-21 |
artikel |
23 |
Incremental multi-agent path finding
|
Semiz, Fatih |
|
|
116 |
C |
p. 220-233 |
artikel |
24 |
Large-scale online multi-view graph neural network and applications
|
Li, Zhao |
|
|
116 |
C |
p. 145-155 |
artikel |
25 |
Lightweight authentication for IoT/Cloud-based forensics in intelligent data computing
|
Deebak, B.D. |
|
|
116 |
C |
p. 406-425 |
artikel |
26 |
Linking OpenStreetMap with knowledge graphs — Link discovery for schema-agnostic volunteered geographic information
|
Tempelmeier, Nicolas |
|
|
116 |
C |
p. 349-364 |
artikel |
27 |
Louder bark with no bite: Privacy protection through the regulation of mandatory data breach notification in Australia
|
Alazab, Mamoun |
|
|
116 |
C |
p. 22-29 |
artikel |
28 |
Multiple improved residual networks for medical image super-resolution
|
Qiu, Defu |
|
|
116 |
C |
p. 200-208 |
artikel |
29 |
Parameter fitting of variogram based on hybrid algorithm of particle swarm and artificial fish swarm
|
Zhang, Xialin |
|
|
116 |
C |
p. 265-274 |
artikel |
30 |
Pkg2Vec: Hierarchical package embedding for code authorship attribution
|
Mateless, Roni |
|
|
116 |
C |
p. 49-60 |
artikel |
31 |
Real time performance analysis of secure IoT protocols for microgrid communication
|
Kondoro, Aron |
|
|
116 |
C |
p. 1-12 |
artikel |
32 |
Recurrent-DC: A deep representation clustering model for university profiling based on academic graph
|
Kong, Xiangjie |
|
|
116 |
C |
p. 156-167 |
artikel |
33 |
Resurrecting anti-virtualization and anti-debugging: Unhooking your hooks
|
Apostolopoulos, Theodoros |
|
|
116 |
C |
p. 393-405 |
artikel |
34 |
Similarity preserving overlapping community detection in signed networks
|
He, Chaobo |
|
|
116 |
C |
p. 275-290 |
artikel |
35 |
Social mining for terroristic behavior detection through Arabic tweets characterization
|
Alhalabi, Wadee |
|
|
116 |
C |
p. 132-144 |
artikel |